Command Line Reference Guide

1454 | E-Series Debugging and Diagnostics
www.dell.com | support.dell.com
ip control-plane egress-filter-traffic
e
Apply Layer 3 egress ACLs to the CPU generated traffic.
Syntax
ip control-plane egress-filter-traffic
To disable, use the no ip control-plane egress-filter-traffic command.
Defaults
Disabled
Command Modes
CONFIGURATION
Command
History
Usage
Information
CPU ACLs are useful for troubleshooting packet flow that has bypassed the hardware-based
distributed forwarding path and is traveling directly to the RPM CPU. This command is useful in
debugging the CPU originated control traffic. You can use the egress ACL with count option to verify
if the control traffic sent by the CPU made it to the line card egress or not.
Using permit rules with the count option, you can track, on a per-flow basis, whether CPU-generated
packets were transmitted successfully. In addition, you can block certain CPU-generated and
soft-forwarded traffic.
This feature also allows you to configure an extended ACL that matches ICMP packets using the count
option, apply the ACL to an egress physical interface, and then ping through that interface to the
remote device.
ipv6 control-plane egress-filter-traffic
e
Apply Layer 3 egress ACLs to the CPU generated traffic.
Syntax
ipv6 control-plane egress-filter-traffic
To disable, use the no ipv6 control-plane egress-filter-traffic command.
Defaults
Disabled
Command Modes
CONFIGURATION
Command
History
Usage
Information
CPU ACLs are useful for troubleshooting packet flow that has bypassed the hardware-based
distributed forwarding path and is traveling directly to the RPM CPU. This command is useful in
debugging the CPU originated control traffic. You can use the egress ACL with count option to verify
if the control traffic sent by the CPU made it to the line card egress or not.
Using permit rules with the count option, you can track, on a per-flow basis, whether CPU-generated
packets were transmitted successfully. In addition, you can block certain CPU-generated and
soft-forwarded traffic.
This feature also allows you to configure an extended ACL that matches ICMP packets using the count
option, apply the ACL to an egress physical interface, and then ping through that interface to the
remote device.
Version 7.6.1.0 Introduced on the E-Series only
Note: Only Layer 3 traffic goes through the ACL—i.e. BPDUs will not be captured.
Version 7.6.1.0 Introduced on E-Series
Note: Only Layer 3 traffic goes through the ACL—i.e. BPDUs will not be captured.